{"id":23775,"date":"2024-01-24T03:10:07","date_gmt":"2024-01-24T11:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/01\/24\/news-17505\/"},"modified":"2024-01-24T03:10:07","modified_gmt":"2024-01-24T11:10:07","slug":"news-17505","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/24\/news-17505\/","title":{"rendered":"Update now! Apple releases patch for zero-day vulnerability"},"content":{"rendered":"\n<p>Apple has released new security updates for several products, including a patch for a zero-day vulnerability that could impact iPhones, iPad, Macs, and Apple TVs.<\/p>\n<p>Apple says it\u2019s aware of a report that the bug may have been exploited already. Further details about the nature of the vulnerability were not disclosed to give users enough time to install the updates.<\/p>\n<p>The updates may already have reached you if you automatically update, but it doesn\u2019t hurt to check <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noreferrer noopener\">you&#8217;re on the latest version<\/a>.<\/p>\n<p>If a Safari update is available for your device, you can get it by&nbsp;<a href=\"https:\/\/support.apple.com\/en-us\/HT204204\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">updating your iPhone or iPad<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/support.apple.com\/en-us\/HT201541\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">updating your Mac.<\/a><\/p>\n<p>Updates are available for:<\/p>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214056\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Safari 17.3<\/a><\/td>\n<td>macOS Monterey and macOS Ventura<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214059\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">iOS 17.3 and iPadOS 17.3<\/a><\/td>\n<td>iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214063\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">iOS 16.7.5 and iPadOS 16.7.5<\/a><\/td>\n<td>iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214062\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">iOS 15.8.1 and iPadOS 15.8.1<\/a><\/td>\n<td>iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214061\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">macOS Sonoma 14.3<\/a><\/td>\n<td>macOS Sonoma<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214058\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">macOS Ventura 13.6.4<\/a><\/td>\n<td>macOS Ventura<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214057\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">macOS Monterey 12.7.3<\/a><\/td>\n<td>macOS Monterey<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214060\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">watchOS 10.3<\/a><\/td>\n<td>Apple Watch Series 4 and later<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/support.apple.com\/kb\/HT214055\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">tvOS 17.3<\/a><\/td>\n<td>Apple TV HD and Apple TV 4K (all models)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-technical-details\">Technical details<\/h2>\n<p>The zero-day vulnerability is listed as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-23222\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-23222<\/a>: a type confusion issue in WebKit that was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution.<\/p>\n<p>Type confusion can occur in interpreted languages such as JavaScript and PHP, which use dynamic typing. In dynamic typing, the type of a variable is determined and updated at runtime, as opposed to being set at compile-time in a statically typed language. A type confusion vulnerability means an attacker has the opportunity to change the type of a given variable in order to trigger unintended behavior.<\/p>\n<p>Several other vulnerabilities in WebKit, which is the browser engine that powers Safari and other apps, were patched as well.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-cisa\">CISA<\/h2>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its\u00a0<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Known Exploited Vulnerabilities Catalog<\/a>, based on evidence of active exploitation. This means Federal Civilian Executive Branch (FCEB) agencies need to remediate this vulnerability by February 13, 2024 in order to protect their devices against active threats.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/01\/update-now-apple-releases-patch-for-zero-day-vulnerability\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Apple has released new security updates for several products including a patch for a zero-day vulnerability which may have been exploited. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,30765,22783,32,10753,11524],"class_list":["post-23775","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-cve-2024-23222","tag-exploits-and-vulnerabilities","tag-news","tag-webkit","tag-zero-day"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23775"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23775\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23775"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}